G06V30/40

Blocking deceptive online content

In one aspect, the present disclosure relates to a method for reducing fraud in computer networks, the method including receiving, from each of a plurality of user devices, a request to block an ad displayed within a web browser installed on the user device, the request comprising image data and a forwarding URL associated with the ad; storing crowdsourced ad blocking data based on the received requests to block ads; receiving a request for a list of blocked ads; generating a list of blocked ads based on analyzing the crowdsourced ad blocking data, wherein analyzing the crowdsourced ad blocking data comprises identifying ads blocked by at least a threshold number of users; and sending the list of blocked ads to a first user device, the first user device comprising a browser extension configured to prevent ads within the list of blocked ads from being rendered in a browser.

SYSTEMS AND METHODS FOR MOBILE IMAGE CAPTURE AND CONTENT PROCESSING OF DRIVER'S LICENSES
20230091041 · 2023-03-23 ·

Systems and methods are provided for processing and extracting content from an image captured using a mobile device. In one embodiment, an image is captured by a mobile device and corrected to improve the quality of the image. The corrected image is then further processed by adjusting the image, identifying the format and layout of the document, binarizing the image and extracting the content using optical character recognition (OCR). Multiple methods of image adjusting may be implemented to accurately assess features of the document, and a secondary layout identification process may be performed to ensure that the content being extracted is properly classified.

SYSTEMS AND METHODS FOR MOBILE IMAGE CAPTURE AND CONTENT PROCESSING OF DRIVER'S LICENSES
20230091041 · 2023-03-23 ·

Systems and methods are provided for processing and extracting content from an image captured using a mobile device. In one embodiment, an image is captured by a mobile device and corrected to improve the quality of the image. The corrected image is then further processed by adjusting the image, identifying the format and layout of the document, binarizing the image and extracting the content using optical character recognition (OCR). Multiple methods of image adjusting may be implemented to accurately assess features of the document, and a secondary layout identification process may be performed to ensure that the content being extracted is properly classified.

METHOD FOR EXTRACTING INSTRUCTIONS FOR MONITORING AND/OR CONTROLLING A CHEMICAL PLANT FROM UNSTRUCTURED DATA
20230087208 · 2023-03-23 ·

The present invention is in the field of computer-implemented methods for monitoring or controlling a chemical plant. It relates to a computer-implemented method for monitoring and/or controlling a chemical plant comprising (a1) providing unstructured data containing instructions for monitoring and/or controlling a chemical plant, (a2) providing information about the chemical plant at least including information of the geographical location of the plant or the compound handled in the plant through an interface, (b1) providing the unstructured data and the information about the chemical plant to a model suitable for extracting the instructions from the structured data, (b2) obtaining from the model instruction together with metadata including the applicability of the instruction related to at least one of time period, a geographical scope, or the compounds to be handled in the plant, and (c) outputting the instructions received from the model.

Session unique access token for communications with a vehicle

A system includes a first computer including a processor programmed to receive, from a remote device, a first digital document including a digital signature from a server and specifying access to one or more vehicle systems for a user. The processor is further programmed to receive, from the server, a second digital document authorizing the specified access to the one or more vehicle systems; and provide, to the remote device, the specified access to the one or more vehicle systems based on the first digital document and second digital document.

GAMING SERVICE AUTOMATION SYSTEM WITH GRAPHICAL USER INTERFACE

A robot management system (RMS) includes a plurality of service robots deployed within an operations venue that includes a plurality of gaming devices, an operator terminal presenting a graphical user interface (GUI) to an operator, and a robot management system server (RMS server) configured in networked communication with the plurality of service robots. The RMS server is configured to: identify location data for the service robots; create an interactive overlay map of the operations venue that includes a static map of the operations venue, overlay data showing the location data of the plurality of service robots over the static map, and an interactive icon for each service robot of the plurality of service robots; display, via the GUI, the overlay map; receive a first input indicating a selection of a first interactive icon associated with a first service robot; and display current status information associated with the first service robot.

MACHINE LEARNING PIPELINE FOR DOCUMENT IMAGE QUALITY DETECTION AND CORRECTION
20220350996 · 2022-11-03 · ·

A computing system receives, from a client device, an image of a content item uploaded by a user of the client devices. The computing system divides the image into one or more overlapping patches. The computing system identifies, via a first machine learning model, one or more distortions present in the image based on the image and the one or more overlapping patches. The computing system determines that the image meets a threshold level of quality. Responsive to the determining, the computing system corrects, via a second machine learning model, the one or more distortions present in the image based on the image and the one or more overlapping patches. Each patch of the one or more overlapping patches are corrected. The computing system reconstructs the image of the content item based on the one or more corrected overlapping patches.

IDENTITY VERIFICATION IN A DOCUMENT MANAGEMENT SYSTEM

A document management system performs name matching operations to validate an identity claimed by a recipient of a document. To validate a claimed identity the document management system compares name data obtained from an identity data source with name data corresponding to a recipient entity of a document to determine whether name features of the identity source name data match recipient name data. The name matching operations may include applying a set of name matching rules to the identity source name data and the recipient name data to determine whether features that differ between the identity source name data and the recipient name data are acceptable alternative representations. Responsive to successfully validating the identity, the system may authorize the recipient to perform actions on the document. Identity source name data may be received from a variety of identity data sources, such as an identity document or a trusted service provider.

Deal room platform using blockchain
11611440 · 2023-03-21 · ·

A method for managing a deal room using a cryptographic ledger that includes a plurality of blocks that store information relating to a deal being hosted in the deal room, the method comprising: receiving a request to perform an operation with respect to the deal room from a remote computing device, wherein the request indicates a user that is requesting permission to perform the operation and a permission key corresponding to the user; determining a cryptographic hash of the operation specific permission key using a hash function; transmitting the cryptographic hash to a plurality of node computing device, wherein each node computing device stores at least a portion of the cryptographic ledger, and wherein the cryptographic ledger in part stores cryptographic hashes of operation specific permission keys that indicate permissions granted to respective users associated with the deal.

Deal room platform using blockchain
11611440 · 2023-03-21 · ·

A method for managing a deal room using a cryptographic ledger that includes a plurality of blocks that store information relating to a deal being hosted in the deal room, the method comprising: receiving a request to perform an operation with respect to the deal room from a remote computing device, wherein the request indicates a user that is requesting permission to perform the operation and a permission key corresponding to the user; determining a cryptographic hash of the operation specific permission key using a hash function; transmitting the cryptographic hash to a plurality of node computing device, wherein each node computing device stores at least a portion of the cryptographic ledger, and wherein the cryptographic ledger in part stores cryptographic hashes of operation specific permission keys that indicate permissions granted to respective users associated with the deal.